No menu items!
No menu items!
More

    News

    Acronym Overdose – Navigating the Complex Data Security Landscape

    In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms...

    Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

    Oct 19, 2024Ravie LakshmananNetwork Security / Data Breach A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber...

    Workshop on Updating Manufacturer Guidance for Securable Connected Product Development

    NIST invites the cybersecurity and IoT communities to join a discussion on updating Foundational Cybersecurity Activities for IoT Device Manufacturers (NIST IR 8259)...

    North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

    Oct 18, 2024Ravie LakshmananInsider Threat / Cyber Espionage North Korean information technology (IT) workers who obtain employment under false identities in Western companies are...

    Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign

    Oct 18, 2024Ravie LakshmananThreat Intelligence / Phishing Attack Threat actors are leveraging fake Google Meet web pages as part of an ongoing malware campaign...

    U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

    Oct 18, 2024Ravie LakshmananCyber Intelligence / Critical Infrastructure Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign...

    Webinar on Building a Strong Data Security Posture

    Oct 18, 2024The Hacker NewsWebinar / Data Protection Picture your company's data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some...

    Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser

    Oct 18, 2024Ravie LakshmananThreat Intelligence / Browser Security Microsoft has disclosed details about a now-patched security flaw in Apple's Transparency, Consent, and Control (TCC)...

    Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant

    Oct 17, 2024Ravie LakshmananThreat Intelligence / Malware The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks...

    Latest articles

    spot_imgspot_img